Phishing: Educating the Internet users - a practical approach using email screen shots
暂无分享,去创建一个
[1] William L. Simon,et al. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .
[2] Lorrie Faith Cranor,et al. Lessons from a real world evaluation of anti-phishing training , 2008, 2008 eCrime Researchers Summit.
[3] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[4] Bruce Schneier,et al. Secrets and Lies , 2004 .
[5] Mark Ciampa. Security Awareness: Applying Practical Security in Your World , 2004 .
[6] Lorrie Faith Cranor,et al. Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.
[7] Nilesh B. Prajapati,et al. CASE STUDY ON SOCIAL ENGINEERING TECHNIQUES FOR PERSUASION , 2010 .
[8] E. Cyril,et al. Phishing: A Growing Challenge for Internet Banking Providers in Malaysia , 2008 .
[9] I. Mann. Hacking the Human: Social Engineering Techniques and Security Countermeasures , 2008 .
[10] Brian M. Bowen,et al. Measuring the human factor of cyber security , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[11] Mark Ciampa. CompTIA Security+ 2008 In Depth , 2008 .